
Crypto Wallets and Security: How to secure your crypto portfolio
Key takeaways
• A crypto wallet does not store your crypto. It stores the private keys that prove ownership of your assets on the blockchain. Whoever controls the keys controls the funds.
• Security risks in crypto are different from traditional banking. Transactions are irreversible, there is no fraud department to call, and lost access to a private key means the funds are gone permanently.
• Hot wallets offer convenience for active trading. Cold wallets offer maximum protection for long-term holdings. Most experienced traders use both for different purposes.
• The biggest security threats are not sophisticated hacks. They are phishing attacks, API key misuse, weak passwords, poor seed phrase storage, and social engineering that exploits human behaviour rather than code.
• Active traders and bot users face additional risks that most security guides do not cover: API key exposure, over-permissive bot configurations, automation malfunctions, and exchange custody risk.
• Security is part of risk management, not separate from it. Most beginners only think about Stop Loss orders. Professionals think about every layer: from the exchange they trust, to how their API keys are configured, to where their seed phrases are stored.
- Why crypto wallet security
- How crypto wallets work
- The main types of crypto wallets and their security trade-offs
- The biggest security threats to your crypto
- Your complete security checklist
- Security for active traders: what most guides miss
- What to do if your wallet or account is compromised
- Choosing the right wallet setup for your situation
Start Trading on 3Commas Today
Get full access to all 3Commas trading tools with free trial period

Why crypto wallet security
According to blockchain analytics firms, billions of dollars worth of cryptocurrency were stolen from individuals and platforms in 2025 and early 2026. A large proportion of those losses were not sophisticated technical exploits. They were the result of predictable, preventable mistakes: reused passwords, compromised API keys, phishing links clicked without thinking, and seed phrases stored in places that were not as private as the owner believed.
What makes crypto security fundamentally different from protecting a bank account is the absence of reversibility. If your bank account is compromised and money is transferred out fraudulently, your bank can reverse the transaction, investigate the fraud, and compensate you. In crypto, once a transaction is confirmed on the blockchain, it cannot be undone by anyone. There is no fraud department, no recovery process, and no authority to appeal to. The funds are gone.
This is not a reason to avoid crypto. It is a reason to take security seriously before something goes wrong rather than after. The practical measures required are not complicated. They take an hour to implement properly and then become a habit. What they require is understanding what you are actually protecting and why each step matters.
Nikolai Tovarnitski, 3Commas Expert: On the broader scope of what security actually means
Most beginners think only about Stop Loss orders. Professionals think about every aspect of security: from choosing a reliable exchange to securely connecting API keys, distributing funds across multiple exchanges and sub-accounts, and properly configuring bots and signals. Security is not a separate topic from risk management. It is part of it. Every decision you make about where to hold funds, how to connect trading tools, and how to protect your accounts either adds to your overall risk exposure or reduces it.
How crypto wallets work
What a wallet holds is the private key: a long cryptographic string that proves you have the right to move the funds associated with a specific blockchain address.
The word wallet creates a misleading mental image. A physical wallet holds money. A crypto wallet does not hold your cryptocurrency. Your crypto exists on the blockchain, a distributed record that cannot be moved or deleted.
Think of it this way. Your blockchain address is like a transparent safe that everyone can see. Anyone can look at your address and see the balance. But only the person with the private key can open it. If you have the key, you can send the funds. If you do not have the key, or if someone else has a copy of it, you have lost control of what is inside.
Public keys, private keys, and seed phrases
Every wallet has a public key and a private key that are mathematically linked. Your public key generates your wallet address, which you share freely to receive funds. Your private key is what you use to authorise transactions. Never share it.
Most modern wallets generate a seed phrase, also called a recovery phrase or mnemonic phrase, which is a sequence of 12 to 24 random words. This seed phrase is a human-readable representation of your private key. Anyone who has your seed phrase can reconstruct your private key and gain full access to all funds in all accounts derived from that seed. Protecting your seed phrase is the single most important security action for any crypto wallet holder.
The one rule that prevents most wallet losses
Your seed phrase is never to be typed into any website, app, or digital document. It should never be photographed, stored in cloud storage, sent via email, message, or any digital channel. Write it down on paper, store it somewhere physically secure, and if your holdings are significant, consider a metal backup that survives fire or water damage. The people asking you to enter your seed phrase online are trying to steal everything in your wallet.
Custodial versus non-custodial wallets
A custodial wallet is one where a third party, typically an exchange, holds your private keys on your behalf. When you hold funds on Binance or Coinbase, you do not have the private key. The exchange does. You have a balance in their system, backed by their promise to return it. This is convenient and often appropriate for active trading, but it introduces counterparty risk.
A non-custodial wallet is one where you hold your own private keys. Nobody else has access. The security of your funds depends entirely on how well you protect that key. This eliminates counterparty risk but places full responsibility on you.
The main types of crypto wallets and their security trade-offs
Wallet types exist on a spectrum from maximum convenience to maximum security. Understanding where each type sits on that spectrum helps you make the right choice for each purpose.
Hot wallets: connected and convenient
A hot wallet is any wallet that is connected to the internet. Software wallets on your computer or phone, browser extension wallets like MetaMask, and exchange account wallets are all hot wallets. They allow fast access and are well-suited for funds you are actively trading or using regularly.
The security tradeoff is exposure. Because a hot wallet connects to the internet, it can potentially be reached by malware, phishing attacks, or vulnerabilities in the software itself. Hot wallets are appropriate for the amount of crypto you need quick access to. They are not appropriate for long-term savings or large holdings.
Cold wallets: offline and protected
A cold wallet has no connection to the internet. Hardware wallets like Ledger and Trezor are physical devices that store your private key offline. To sign a transaction, you connect the device, confirm the action physically on the device itself, and the transaction is signed without the private key ever being exposed to an internet-connected environment.
Cold storage is the appropriate method for any crypto holdings you are not actively trading. The inconvenience of accessing a hardware wallet is a feature, not a limitation: it means that no remote attack can reach the funds.
Exchange wallets: custodial convenience with important limits
When you hold funds on an exchange, you are using the exchange's custodial wallet service. This is necessary for active trading because it allows fast execution without the friction of self-custody. The security depends entirely on the exchange's practices, infrastructure, and financial health.
FTX's collapse in November 2022 demonstrated what happens when those practices fail. Funds that users believed were safely custodied were not available for withdrawal because they had been misappropriated. The lesson is not to avoid exchanges entirely. It is to understand that exchange custody carries counterparty risk, to choose exchanges that demonstrate responsible practices, and to limit the amount of capital held on any single exchange.
Wallet type | Security level | Best suited for | Main risk |
|---|---|---|---|
Exchange wallet | Depends on exchange | Active trading funds, short-term positions | Counterparty risk; exchange failure or freeze |
Software hot wallet | Medium | DeFi, regular transactions, on-chain trading | Malware, phishing, device compromise |
Mobile hot wallet | Medium | Everyday use, small amounts, on-the-go access | Phone loss, theft, malicious apps |
Hardware cold wallet | High | Long-term holdings, savings, large balances | Physical loss or damage; buying from unofficial sources |
Paper wallet | High if stored correctly | Long-term offline storage; very rarely moved | Physical destruction, discovery, degradation over time |
The biggest security threats to your crypto
Understanding threats in the abstract is less useful than understanding what they actually look like when they happen. These are the most common attack vectors, including several that most general wallet guides do not cover.
Phishing attacks and fake platforms
Phishing is the most common cause of crypto theft at the individual level. An attacker creates a website that looks identical to a legitimate exchange or wallet provider. You land on it from a search result, a link in an email, or a message in Telegram or Discord. You enter your login credentials or, worse, your seed phrase. The attacker now has everything they need.
Phishing has evolved significantly. Fake support agents in Telegram and Discord are now routine: they contact users who have posted questions in official community channels, offer to help, and then direct them to fake websites or ask for credentials under the pretence of resolving an issue. No legitimate support agent ever needs your password or seed phrase.
Nikolai Tovarnitski, 3Commas Expert: On phishing as the most persistent threat
Fake exchange websites and fake support agents in Telegram and Discord are still one of the most common ways traders lose funds. Scammers do not break systems. They trick people. The easiest hack is often ourselves. Before taking any action prompted by any message, ask yourself: can this be a scam? If you have any doubt, stop and verify through official channels before doing anything. Never click links from messages, even from people you believe you know, without independently confirming the URL is correct
Exchange risk and counterparty failure
Nikolai Tovarnitski, 3Commas Expert: On exchange risk as a real and underestimated threat
Even large exchanges can fail, as we saw with FTX's bankruptcy in November 2022. They can freeze withdrawals or face regulatory issues. If your funds are on an exchange, you do not have full control over them. If you keep funds on exchanges, it is better to diversify by holding some on one exchange and some on another. This way, if one platform encounters problems, your entire capital is not at risk. A reliable exchange should have sufficient liquidity to handle large withdrawals and market volatility without issues. You should always consider whether the exchange clearly proves it holds user funds 1:1, maintains strong liquidity, and operates with transparency. If not, that is a serious reason to be cautious.
The practical response to exchange risk is not to avoid exchanges but to distribute funds intelligently. Only keep on any single exchange the amount of capital required for your active trading allocation. Profits and longer-term holdings belong in cold storage or spread across multiple regulated exchanges.
API key exposure for traders using bots
This is the threat that most security guides for general crypto holders do not cover, but it is highly relevant for traders using automation tools. When you connect a trading bot to your exchange account via API, you create a key that allows the bot to interact with your account. If that key is compromised, someone else can use it to trade on your account or, if withdrawal permissions were enabled, drain your funds.
Nikolai Tovarnitski, 3Commas Expert: On API key security as a critical and often overlooked risk
Traders using bots often underestimate this risk. The most dangerous mistakes are exposed API keys, enabled withdrawal permissions, and weak IP restrictions. One of the reasons I personally value 3Commas is that they take API security very seriously. Features like Fast Connect help users quickly authorise specific account permissions, securely create API keys, and automatically connect accounts without unnecessary manual steps. If your exchange does not support Fast Connect or you are trying to connect exchange sub-accounts, you should always enable an IP whitelist. This ensures that your API key can only be used on trading platforms like 3Commas and not elsewhere, significantly reducing the risk of misuse.
Poor personal security habits
The most preventable category of losses comes from weak personal security practices. Reused passwords mean that a breach on one unrelated service can give an attacker access to your exchange account. The absence of two-factor authentication means a stolen password is sufficient to log in. Seed phrases stored in photos, notes apps, or cloud storage are accessible to anyone who compromises that device or cloud account.
Automation malfunctions and misconfigured bots
Nikolai Tovarnitski, 3Commas Expert: On the specific risk of automation going wrong
Automation increases efficiency, but also risk if it is not properly controlled. I once had an incident where, while testing a new strategy, the signals from my system malfunctioned, and the bots started receiving signals to enter trades or average positions on every 15-minute candle. Always keep control over your bots to ensure they do not accumulate orders or open new trades beyond what your risk management allows. This can really protect your deposit. Automation should be controlled, not trusted blindly. Wrong bot settings and blind trust in signals are real risks that systematic traders face in addition to the security threats that every crypto holder faces.
Your complete security checklist
The following practices cover the full scope of crypto security for active traders. None of them are technically difficult. Together, they address the overwhelming majority of real attack vectors.
Account protection
- Enable two-factor authentication using an authenticator app. Google Authenticator or Authy are standard choices. SMS-based 2FA is significantly weaker because SIM swapping attacks can bypass it. Use an app, not a text message.
- Use a unique, strong password for every exchange and wallet. A password manager makes this practical. Never reuse passwords across services. A breach on any one service should not compromise your crypto accounts.
- Enable withdrawal address whitelisting wherever available. This feature restricts withdrawals to addresses you have pre-approved, meaning a compromised account cannot send funds to a new address without passing an additional confirmation step.
- Use an email address dedicated to crypto that you do not use for anything else. This reduces the attack surface: a phishing attack on your regular email has no path to your crypto accounts.
API key safety for traders
- Never enable withdrawal permissions on any API key. Trading bots do not need withdrawal access. Enabling it creates a risk that cannot be justified by any operational benefit.
- Restrict API access by IP address. Set an IP whitelist so that your API key only responds to requests from your trading platform's servers. An exposed key with IP restriction is significantly less dangerous than one without.
- Delete API keys you are no longer using. Every active key is a potential attack vector. If you are not actively using a bot connection, revoke the key.
- Audit connected applications regularly. Check which external applications have API access to each exchange account. Remove any you do not recognise or no longer use.
Seed phrase and private key protection
- Write your seed phrase on paper immediately and store it offline. Never photograph it, type it into any device, or store it digitally in any form.
- Store the written backup in a physically secure location. A fireproof safe at home, a safety deposit box at a bank, or a dedicated secure location known only to you. For significant holdings, consider a metal backup that survives physical damage.
- Never enter your seed phrase on any website or application. No legitimate wallet recovery, exchange, or support process ever requires your seed phrase. If anything asks for it, it is fraud.
- Have a plan for key inheritance. If something happens to you, who can access your crypto? Consider whether trusted family members know where to find your backup and how to use it.
Fund distribution and exchange risk management
- Never hold all your capital on a single exchange. Distribute actively traded funds across two or more reputable, regulated exchanges.
- Move funds not needed for active trading to cold storage. Your longer-term holdings and reserves belong in a hardware wallet, not on an exchange.
- Use sub-accounts for strategy separation. Exchanges that support sub-accounts allow you to isolate capital across different strategies, limiting how much is accessible if one account is compromised.
- Check the exchange's proof of reserves. Use platforms that publish regular, independently verified proof that user funds are fully backed and not misappropriated.
Behaviour and device hygiene
- Bookmark official exchange and wallet websites. Always navigate from your bookmark, never from search results or links in messages. Phishing sites appear at the top of search results regularly.
- Never access your exchange or wallet from public Wi-Fi. If you need to trade away from home, use a VPN or a mobile data connection.
- Keep your operating system, browser, and apps updated. Most malware exploits known vulnerabilities that have already been patched. Updates close those doors.
- Be sceptical of browser extensions. Malicious browser extensions that target crypto users are common. Audit your installed extensions regularly and remove any you do not actively use or that you installed without careful verification.
Security for active traders: what most guides miss
The security guides published by most crypto platforms are written for passive holders. They cover seed phrase storage and hardware wallets, which are important, but they leave out a significant portion of the threat landscape for traders who use exchanges actively and connect automated tools.
Balancing security with trading speed
Active trading requires fast access to your exchange accounts. The friction that makes cold storage secure, connecting a hardware device, confirming transactions physically, is incompatible with making fast market decisions. The practical solution is to maintain two separate categories of funds with different security approaches.
Trading capital, meaning the portion of your portfolio you are actively deploying in market positions, lives on exchanges with full trading permissions enabled and 2FA set up on your account. The security layer here comes from account-level protections: strong 2FA, unique passwords, withdrawal whitelisting, and choosing exchanges with strong security track records.
Savings and reserves, meaning funds you are not actively trading, live in cold storage where the absence of internet connectivity provides structural protection that no account-level measure can replicate.
The hot wallet and cold storage balance
Nikolai Tovarnitski, 3Commas Expert: On how to think about the hot and cold balance
The balance I use is: hot wallets and exchanges for active trading, cold storage for savings. Security is part of risk management. When you commit to this separation and actually follow it rather than just intending to, it fundamentally changes your risk profile. Even if your exchange account is compromised, your savings are not accessible. Even if your hot wallet is drained, your long-term position is intact. The separation is what makes the difference, not any individual security measure applied to a single account.
Connecting wallets and bots to 3Commas securely
When connecting your exchange to 3Commas, the API key you create should have the minimum permissions required for your intended use. For bot trading, that means trade execution permissions only. Withdrawal permissions should never be enabled on any API key used with a trading platform. If the exchange is compromised or the platform itself is targeted, withdrawal access converts a trading risk into a funds loss risk.
3Commas' Fast Connect feature creates API keys with appropriate permissions automatically, reducing the risk of accidentally granting excessive access during manual setup. For connections where Fast Connect is not available, enabling an IP whitelist restricts your API key to requests originating from 3Commas' servers specifically, so even if the key is discovered, it cannot be used from any other source.
Review your API connections periodically. If you stopped using a particular bot strategy or disconnected from an exchange, revoke the corresponding API key. Old keys with trading permissions that are no longer actively monitored represent unnecessary risk.
What to do if your wallet or account is compromised
Speed matters when an account is compromised. The first minutes determine how much of your remaining balance can be secured before the attacker moves it.
- Revoke all API keys immediately. If your exchange account has been accessed, remove every API key before anything else. This stops any automated activity the attacker may have set up.
- Change your password from a different device. If your primary device may be compromised, do not use it to change credentials. Use a clean device on a different network.
- Contact the exchange's security team. Most major exchanges have priority support for suspected compromised accounts. They may be able to freeze your account temporarily while you regain control.
- Transfer remaining funds to a new wallet or exchange. If your non-custodial wallet's private key may be compromised, create a new wallet on a clean device, write down the new seed phrase securely, and transfer all remaining funds immediately.
- Document everything. Record transaction IDs of any unauthorised transfers, timestamps, and any communications you received that may have been part of the attack. This supports any subsequent investigation.
- Identify the attack vector before setting up new accounts. If you do not understand how the compromise happened, recreating the same setup will recreate the same vulnerability. Audit your security practices fully before resuming trading.
When recovery is not possible
If a non-custodial wallet has been completely drained and the attacker has moved the funds through multiple addresses, practical recovery is unlikely. Blockchain transactions are irreversible. Law enforcement can investigate and potentially identify perpetrators in some cases, but recovering the funds themselves is rare. This is why prevention matters so much: there is no recovery process to rely on after the fact.
Choosing the right wallet setup for your situation
There is no single wallet configuration that is right for everyone. The appropriate setup depends on your portfolio size, trading frequency, and comfort level with self-custody.
Trader type | Recommended setup | Key security priorities |
|---|---|---|
Beginner, small balance | One reputable regulated exchange for trading. Seed phrase backup for any self-custody wallet. | Strong 2FA, unique password, no withdrawal API permissions, understand phishing risks. |
Active spot trader | Two exchanges for redundancy. Hardware wallet for savings above active trading allocation. | API key IP whitelisting, withdrawal whitelisting, regular key audits, exchange proof of reserves. |
Automated bot trader | Two or more exchanges, sub-accounts per strategy, hardware wallet for long-term holdings. | Minimum API permissions, IP whitelist, no withdrawal access, regular bot parameter audits, Fast Connect where available. |
Large portfolio holder | Multiple hardware wallets, multiple exchanges, potentially a multi-signature wallet setup for very large balances. | Physical backup on metal plates, inheritance planning, regular security audits of all connected applications. |
Red flags when evaluating any new wallet or platform
- The wallet app or platform does not have an independently verified security audit history.
- The setup process asks you to enter your existing seed phrase from another wallet.
- The platform has no clear information about the company behind it, its regulatory status, or its security practices.
- Community members in Telegram or Discord are unusually enthusiastic about recommending it, particularly in response to questions about other platforms.
- The app was not downloaded from the official app store or the wallet provider's own verified website.
- Promised returns or features that seem too good to be true relative to established alternatives.
Frequently asked questions about crypto wallets and security
The security of a crypto wallet depends almost entirely on how it is set up and used rather than on the wallet software itself. A hardware wallet stored securely with its seed phrase backed up offline is extremely difficult to compromise. The same hardware wallet with its seed phrase stored in a cloud notes app is only as secure as that notes account. Most successful wallet compromises exploit human behaviour: stolen seed phrases, phishing-induced credential entry, malware on an insecure device. The technical security of well-regarded wallet software is generally high. The human layer is where most losses occur.
Blockchain transactions are publicly visible on the blockchain. Any transaction from your wallet address is permanently recorded and can be viewed by anyone, including law enforcement and tax authorities. With appropriate legal authority, government agencies can obtain identifying information from exchanges that performed KYC verification for accounts that transacted with your address. The blockchain does not hide transactions; it is a public ledger. What it does is record transactions without a central authority controlling them. Privacy tools exist but operate at a different layer from basic wallet security.
For long-term holdings and large balances, hardware wallets from established manufacturers like Ledger and Trezor are widely considered the most secure option available to retail users because the private key is stored on the device and never exposed to an internet-connected environment. For exchange wallets and active trading, the security depends on the exchange's practices. For software wallets, security depends heavily on the security of the device and the user's behaviour. The safest configuration for most traders is a combination: a reputable hardware wallet for savings and a regulated exchange with strong security features for active trading funds.
3Commas connects to exchange accounts via API rather than directly to self-custody wallets. You create an API key on your supported exchange, configure it with trading permissions only and no withdrawal access, and connect it to 3Commas. This allows 3Commas to execute trades on your behalf without ever accessing your private keys or requiring custody of your funds. Your funds remain on the exchange throughout. For exchanges that support it, 3Commas' Fast Connect feature simplifies this process and reduces the risk of accidentally granting excessive permissions during manual API key setup.
Three practices cover the most significant risks for bot traders specifically. First, never enable withdrawal permissions on any API key used by a trading platform. Second, enable IP address restriction on every API key so it can only be used from the trading platform's servers. Third, audit your active API keys regularly and revoke any that are no longer in use. Beyond API-specific practices, the general security checklist applies: strong unique passwords, authenticator app 2FA, exchange accounts distributed across platforms, and savings held in cold storage rather than on exchanges.
Risk disclaimer
This article is for educational purposes only and does not constitute financial or security advice. Crypto assets are not protected by deposit insurance. Security practices reduce risk but cannot eliminate it entirely. Always verify current security recommendations with official sources. 3Commas is a software platform and does not hold custody of user funds.
ㅤ

Bastien manages a portfolio of 50+ asset managers operating non-custodial SMA structures, as well as VIP traders.
READ MORE
- Why crypto wallet security
- How crypto wallets work
- The main types of crypto wallets and their security trade-offs
- The biggest security threats to your crypto
- Your complete security checklist
- Security for active traders: what most guides miss
- What to do if your wallet or account is compromised
- Choosing the right wallet setup for your situation


